<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <updated>2023-07-23T02:06:31&#43;02:00</updated>
  <generator>https://nostr.ae</generator>

  <title>Nostr notes by CrowdCyber.com</title>
  <author>
    <name>CrowdCyber.com</name>
  </author>
  <link rel="self" type="application/atom+xml" href="https://nostr.ae/npub1xm6q8dj394lxnwmm39zzeepllf3umah26fjp67f4kgu79mp427kscv7acu.rss" />
  <link href="https://nostr.ae/npub1xm6q8dj394lxnwmm39zzeepllf3umah26fjp67f4kgu79mp427kscv7acu" />
  <id>https://nostr.ae/npub1xm6q8dj394lxnwmm39zzeepllf3umah26fjp67f4kgu79mp427kscv7acu</id>
  <icon>https://cdn.nostr.build/i/314ed3b52a5ab39af644495613ef7b47fdcc1d82a366ccc324c88e0576fade98.jpg</icon>
  <logo>https://cdn.nostr.build/i/314ed3b52a5ab39af644495613ef7b47fdcc1d82a366ccc324c88e0576fade98.jpg</logo>




  <entry>
    <id>https://nostr.ae/nevent1qqsg2csmtvlmkdnhdepsjkyxj7sk9262wpz9nnrefdm8xvcf6ac23gczyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66xk72nf</id>
    
      <title type="html">Trigona ransomware attacks use custom exfiltration tool to steal ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsg2csmtvlmkdnhdepsjkyxj7sk9262wpz9nnrefdm8xvcf6ac23gczyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66xk72nf" />
    <content type="html">
      Trigona ransomware attacks use custom exfiltration tool to steal data&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/trigona-ransomware-attacks-use-custom-exfiltration-tool-to-steal-data/&#34;&gt;https://www.bleepingcomputer.com/news/security/trigona-ransomware-attacks-use-custom-exfiltration-tool-to-steal-data/&lt;/a&gt;
    </content>
    <updated>2026-04-24T02:15:48&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsruttavxuvzhcjrantm70rkkzenrwad52ag3c054s5jv5ymlze7jszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66rv0gl2</id>
    
      <title type="html">In the Wild: Information Disclosure (CVE-2026-20133) Exploited in ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsruttavxuvzhcjrantm70rkkzenrwad52ag3c054s5jv5ymlze7jszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66rv0gl2" />
    <content type="html">
      In the Wild: Information Disclosure (CVE-2026-20133) Exploited in Cisco SD-WAN Manager&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityonline.info/cisco-sd-wan-manager-information-disclosure-cve-2026-20133-exploit/&#34;&gt;https://securityonline.info/cisco-sd-wan-manager-information-disclosure-cve-2026-20133-exploit/&lt;/a&gt;
    </content>
    <updated>2026-04-23T21:24:20&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs0kvxpmrum0ksh5umqxvxahecda4jhy8xfx0djtw32vdc44sejztczyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66ztacmz</id>
    
      <title type="html">Recently leaked Windows zero-days now exploited in attacks ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs0kvxpmrum0ksh5umqxvxahecda4jhy8xfx0djtw32vdc44sejztczyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66ztacmz" />
    <content type="html">
      Recently leaked Windows zero-days now exploited in attacks&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/recently-leaked-windows-zero-days-now-exploited-in-attacks/&#34;&gt;https://www.bleepingcomputer.com/news/security/recently-leaked-windows-zero-days-now-exploited-in-attacks/&lt;/a&gt;
    </content>
    <updated>2026-04-17T09:30:26&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsxftyh7rv0t32k7qtyklux880y3083xdz5rsg8m290nxdl3v0hw3qzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66ft2ajr</id>
    
      <title type="html">Your Supply Chain Breach Is Someone Else&amp;#39;s Payday ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsxftyh7rv0t32k7qtyklux880y3083xdz5rsg8m290nxdl3v0hw3qzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66ft2ajr" />
    <content type="html">
      Your Supply Chain Breach Is Someone Else&amp;#39;s Payday&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.recordedfuture.com/blog/your-supply-chain-breach-is-someone-else-payday&#34;&gt;https://www.recordedfuture.com/blog/your-supply-chain-breach-is-someone-else-payday&lt;/a&gt;
    </content>
    <updated>2026-04-16T02:07:05&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs20mxxhuhqvcytzsxtuy6pxgxxtu9anjshcxahtu7tfxe4ywk472czyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66ajqqv6</id>
    
      <title type="html">CVE-2026-4370 (CVSS 10): Critical Juju Flaw Grants Attackers ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs20mxxhuhqvcytzsxtuy6pxgxxtu9anjshcxahtu7tfxe4ywk472czyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66ajqqv6" />
    <content type="html">
      CVE-2026-4370 (CVSS 10): Critical Juju Flaw Grants Attackers Total Infrastructure Control&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityonline.info/juju-critical-vulnerability-cvss-10-cve-2026-4370/&#34;&gt;https://securityonline.info/juju-critical-vulnerability-cvss-10-cve-2026-4370/&lt;/a&gt;
    </content>
    <updated>2026-04-04T23:27:54&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs9tx0utnj62d25887scu3986fak86pl48al2wypgs852efed7e4wgzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t6674f438</id>
    
      <title type="html">Venom Stealer MaaS Platform Commoditizes ClickFix Attacks ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs9tx0utnj62d25887scu3986fak86pl48al2wypgs852efed7e4wgzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t6674f438" />
    <content type="html">
      Venom Stealer MaaS Platform Commoditizes ClickFix Attacks&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.darkreading.com/endpoint-security/venom-stealer-maas-commoditizes-clickfix-attacks&#34;&gt;https://www.darkreading.com/endpoint-security/venom-stealer-maas-commoditizes-clickfix-attacks&lt;/a&gt;
    </content>
    <updated>2026-04-04T20:57:28&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqswzzpt9qej0l4qp555nf5s5ejlw82pehpyr2s249a60flvfet2amszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66x5gn57</id>
    
      <title type="html">Recorded Future Expands Coverage of Scams and Financial Fraud ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqswzzpt9qej0l4qp555nf5s5ejlw82pehpyr2s249a60flvfet2amszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66x5gn57" />
    <content type="html">
      Recorded Future Expands Coverage of Scams and Financial Fraud with Money Mule Intelligence from CYBERA&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.recordedfuture.com/blog/recorded-future-money-mule-intelligence-cybera&#34;&gt;https://www.recordedfuture.com/blog/recorded-future-money-mule-intelligence-cybera&lt;/a&gt;
    </content>
    <updated>2026-04-04T18:41:15&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs2grzxd9sxkuyfpqj3hm8fzq0ur6rl9adhv6rjdu34jtw3wsg9ehczyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66tueg09</id>
    
      <title type="html">New Progress ShareFile flaws can be chained in pre-auth RCE ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs2grzxd9sxkuyfpqj3hm8fzq0ur6rl9adhv6rjdu34jtw3wsg9ehczyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66tueg09" />
    <content type="html">
      New Progress ShareFile flaws can be chained in pre-auth RCE attacks&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/new-progress-sharefile-flaws-can-be-chained-in-pre-auth-rce-attacks/&#34;&gt;https://www.bleepingcomputer.com/news/security/new-progress-sharefile-flaws-can-be-chained-in-pre-auth-rce-attacks/&lt;/a&gt;
    </content>
    <updated>2026-04-04T16:05:54&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsy0q7jp5gce4a46rlcdaat34rxtwr6zz86uwnymwwuv36z7knnksgzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66qndt0r</id>
    
      <title type="html">Threat Intel: Attacker makes off with $1.58 million in Space-X ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsy0q7jp5gce4a46rlcdaat34rxtwr6zz86uwnymwwuv36z7knnksgzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66qndt0r" />
    <content type="html">
      Threat Intel: Attacker makes off with $1.58 million in Space-X Elon Deepfake Crypto Heist&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.karma-x.io/blog/post/36/&#34;&gt;https://www.karma-x.io/blog/post/36/&lt;/a&gt;
    </content>
    <updated>2026-04-04T13:58:50&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqstpgg3ggaft603essa0uw5fysecv44xqehh04yukjztrgknlar2uqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66sa8jqg</id>
    
      <title type="html">Converging Interests: Analysis of Threat Clusters Targeting a ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqstpgg3ggaft603essa0uw5fysecv44xqehh04yukjztrgknlar2uqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66sa8jqg" />
    <content type="html">
      Converging Interests: Analysis of Threat Clusters Targeting a Southeast Asian Government&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.karma-x.io/blog/post/58/&#34;&gt;https://www.karma-x.io/blog/post/58/&lt;/a&gt;
    </content>
    <updated>2026-04-04T11:54:33&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqst9ldwdq8w63y8hu8xskqjskwerec24u2lacp8yd48xt2qdrg34fqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66efj44w</id>
    
      <title type="html">Handala Hack: Unveiling the Modus Operandi of a State‑Backed ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqst9ldwdq8w63y8hu8xskqjskwerec24u2lacp8yd48xt2qdrg34fqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66efj44w" />
    <content type="html">
      Handala Hack: Unveiling the Modus Operandi of a State‑Backed Wiper&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.karma-x.io/blog/post/56/&#34;&gt;https://www.karma-x.io/blog/post/56/&lt;/a&gt;
    </content>
    <updated>2026-04-04T09:53:10&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsvtzp2ffx3vnszr87hyhl7gr4jxlcd3k0uen0upyaxv5zgugjvlpgzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66lwsznx</id>
    
      <title type="html">Residential proxies evaded IP reputation checks in 78% of 4B ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsvtzp2ffx3vnszr87hyhl7gr4jxlcd3k0uen0upyaxv5zgugjvlpgzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66lwsznx" />
    <content type="html">
      Residential proxies evaded IP reputation checks in 78% of 4B sessions&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/residential-proxies-evaded-ip-reputation-checks-in-78-percent-of-4b-sessions/&#34;&gt;https://www.bleepingcomputer.com/news/security/residential-proxies-evaded-ip-reputation-checks-in-78-percent-of-4b-sessions/&lt;/a&gt;
    </content>
    <updated>2026-04-04T07:41:02&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsvsk0x72p35tvt7rchveafkys23qcwyhcq3pjnhxkl59uwtmy89vczyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t663h2evu</id>
    
      <title type="html">Critical Vulnerability in Coldcard Hardware Wallets ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsvsk0x72p35tvt7rchveafkys23qcwyhcq3pjnhxkl59uwtmy89vczyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t663h2evu" />
    <content type="html">
      Critical Vulnerability in Coldcard Hardware Wallets&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.karma-x.io/blog/post/41/&#34;&gt;https://www.karma-x.io/blog/post/41/&lt;/a&gt;
    </content>
    <updated>2026-04-04T05:34:17&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsd2g8pc78nkldvmust8fcggq7wg33cqkxweq0526x0zed2jzaggaczyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66kdqh8m</id>
    
      <title type="html">Inside LinkedIn&amp;#39;s Surveillance Engine: 48 Browser ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsd2g8pc78nkldvmust8fcggq7wg33cqkxweq0526x0zed2jzaggaczyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66kdqh8m" />
    <content type="html">
      Inside LinkedIn&amp;#39;s Surveillance Engine: 48 Browser Fingerprints, Hidden Iframes, and What Users Should Know&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.karma-x.io/blog/post/64/&#34;&gt;https://www.karma-x.io/blog/post/64/&lt;/a&gt;
    </content>
    <updated>2026-04-04T02:53:29&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs0yf2n40qs6wdnke9u89sdxv2rc40h3vwlhhf9n7wrsynmfx3768qzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66ed06v7</id>
    
      <title type="html">Windows Error Reporting Local Privilege Escalation ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs0yf2n40qs6wdnke9u89sdxv2rc40h3vwlhhf9n7wrsynmfx3768qzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66ed06v7" />
    <content type="html">
      Windows Error Reporting Local Privilege Escalation (CVE‑2026‑20817): In‑Depth Technical Analysis, Detection, and Mitigation&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.karma-x.io/blog/post/50/&#34;&gt;https://www.karma-x.io/blog/post/50/&lt;/a&gt;
    </content>
    <updated>2026-04-04T00:37:05&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs20jekee4zlmz06ere5n9h5ywtllpj2qjsv475d8mypc9yqxjs5zszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66j2x4as</id>
    
      <title type="html">F5 BIG-IP Vulnerability Reclassified as RCE, Under Exploitation ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs20jekee4zlmz06ere5n9h5ywtllpj2qjsv475d8mypc9yqxjs5zszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66j2x4as" />
    <content type="html">
      F5 BIG-IP Vulnerability Reclassified as RCE, Under Exploitation&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.darkreading.com/application-security/f5-big-ip-vulnerability-reclassified-rce-exploitation&#34;&gt;https://www.darkreading.com/application-security/f5-big-ip-vulnerability-reclassified-rce-exploitation&lt;/a&gt;
    </content>
    <updated>2026-04-03T22:25:18&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs8eflgsrwg4r2jkjtx2nm9m3sxhvcsqec5tupp7gnnh6ggh4p5nmszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66xnrzhu</id>
    
      <title type="html">Using undocumented AWS CodeBuild endpoints to extract privileged ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs8eflgsrwg4r2jkjtx2nm9m3sxhvcsqec5tupp7gnnh6ggh4p5nmszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66xnrzhu" />
    <content type="html">
      Using undocumented AWS CodeBuild endpoints to extract privileged tokens from AWS CodeConnections allowing lateral movement and privilege escalation through an organisation&amp;#39;s codebase&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.reddit.com/r/netsec/comments/1sbe9tn/using_undocumented_aws_codebuild_endpoints_to/&#34;&gt;https://www.reddit.com/r/netsec/comments/1sbe9tn/using_undocumented_aws_codebuild_endpoints_to/&lt;/a&gt;
    </content>
    <updated>2026-04-03T18:57:26&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsrzqj09uwu0j0xj9ntxn3dykg2g5ha8c05ufuc83hfkn3zh9mjgjqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66kgcteu</id>
    
      <title type="html">Red Menshen’s Upgraded BPFdoor: How China’s Stealthiest ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsrzqj09uwu0j0xj9ntxn3dykg2g5ha8c05ufuc83hfkn3zh9mjgjqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66kgcteu" />
    <content type="html">
      Red Menshen’s Upgraded BPFdoor: How China’s Stealthiest Backdoor Infiltrates Global Telecom Networks&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.karma-x.io/blog/post/59/&#34;&gt;https://www.karma-x.io/blog/post/59/&lt;/a&gt;
    </content>
    <updated>2026-04-03T16:56:07&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsghtyhh6uyhqcsstv9vdg5gv00dj8cddrf487h784c5zsulwsy96gzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66muydn0</id>
    
      <title type="html">Inside the Rapid Evolution of the BlankGrabber Stealer ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsghtyhh6uyhqcsstv9vdg5gv00dj8cddrf487h784c5zsulwsy96gzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66muydn0" />
    <content type="html">
      Inside the Rapid Evolution of the BlankGrabber Stealer&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityonline.info/blankgrabber-python-info-stealer-malware-analysis-splunk/&#34;&gt;https://securityonline.info/blankgrabber-python-info-stealer-malware-analysis-splunk/&lt;/a&gt;
    </content>
    <updated>2026-04-03T14:43:25&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsy8524trn7ldvn4c5vjjy8kctvd22qq20nu4krqn5t9g2fwasr03gzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66084g9q</id>
    
      <title type="html">MAD Bugs: Claude Wrote a Full FreeBSD Remote Kernel RCE with Root ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsy8524trn7ldvn4c5vjjy8kctvd22qq20nu4krqn5t9g2fwasr03gzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66084g9q" />
    <content type="html">
      MAD Bugs: Claude Wrote a Full FreeBSD Remote Kernel RCE with Root Shell (CVE-2026-4747)&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.reddit.com/r/netsec/comments/1s8y8pp/mad_bugs_claude_wrote_a_full_freebsd_remote/&#34;&gt;https://www.reddit.com/r/netsec/comments/1s8y8pp/mad_bugs_claude_wrote_a_full_freebsd_remote/&lt;/a&gt;
    </content>
    <updated>2026-04-03T12:27:49&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqswpv67qpht8sxqs3cj29mrqpr7p5k0t6s4dw2tghs8tve47plkv0czyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66gndlqe</id>
    
      <title type="html">Axios npm Package Compromised: Supply Chain Attack via Phantom ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqswpv67qpht8sxqs3cj29mrqpr7p5k0t6s4dw2tghs8tve47plkv0czyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66gndlqe" />
    <content type="html">
      Axios npm Package Compromised: Supply Chain Attack via Phantom Dependency Drops Cross-Platform RAT&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.karma-x.io/blog/post/62/&#34;&gt;https://www.karma-x.io/blog/post/62/&lt;/a&gt;
    </content>
    <updated>2026-04-03T09:55:32&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsfl0fs0aqfsstf4zlqumtr5qu0v6cvptj04zep57z62uu6fzx0shqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66vxvs3r</id>
    
      <title type="html">Russian CTRL Toolkit: How Malicious LNK Files Enable RDP ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsfl0fs0aqfsstf4zlqumtr5qu0v6cvptj04zep57z62uu6fzx0shqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66vxvs3r" />
    <content type="html">
      Russian CTRL Toolkit: How Malicious LNK Files Enable RDP Hijacking via Reverse Tunnels&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.karma-x.io/blog/post/60/&#34;&gt;https://www.karma-x.io/blog/post/60/&lt;/a&gt;
    </content>
    <updated>2026-04-03T07:55:16&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsd52tdj0lea9afja2vg2lm3cy3qqxtuang3ufafdjapxg5kvcucygzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t666678zv</id>
    
      <title type="html">Backdoor In Common Linux Utility XZ, Multiple Distros Affected: ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsd52tdj0lea9afja2vg2lm3cy3qqxtuang3ufafdjapxg5kvcucygzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t666678zv" />
    <content type="html">
      Backdoor In Common Linux Utility XZ, Multiple Distros Affected: Everything We Know&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.karma-x.io/blog/post/23/&#34;&gt;https://www.karma-x.io/blog/post/23/&lt;/a&gt;
    </content>
    <updated>2026-04-03T05:52:49&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqstlj8ummvvyjx9wflfh8ang9k68ku9u29q68rwzrhy9zzwkznkugszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66l8d22m</id>
    
      <title type="html">Security Alert: Critical Vulnerability Hits Anritsu Remote ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqstlj8ummvvyjx9wflfh8ang9k68ku9u29q68rwzrhy9zzwkznkugszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66l8d22m" />
    <content type="html">
      Security Alert: Critical Vulnerability Hits Anritsu Remote Spectrum Monitors&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityonline.info/anritsu-spectrum-monitor-unpatchable-vulnerability-cve-2026-3356/&#34;&gt;https://securityonline.info/anritsu-spectrum-monitor-unpatchable-vulnerability-cve-2026-3356/&lt;/a&gt;
    </content>
    <updated>2026-04-03T03:10:35&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsgy2pkjlprdw0wh9vtp0p0h5u46l8gm6lelweg8jdnvg3l5xkpxnqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66mr58pv</id>
    
      <title type="html">LiteLLM Supply-Chain Attack: How Trojanized PyPI Packages Turned ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsgy2pkjlprdw0wh9vtp0p0h5u46l8gm6lelweg8jdnvg3l5xkpxnqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66mr58pv" />
    <content type="html">
      LiteLLM Supply-Chain Attack: How Trojanized PyPI Packages Turned an AI Gateway Into a Data Exfiltration Tool&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.karma-x.io/blog/post/63/&#34;&gt;https://www.karma-x.io/blog/post/63/&lt;/a&gt;
    </content>
    <updated>2026-04-03T00:43:37&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqstqqc8fz6gxkdckhvf77c3smsdfuv9annrn3pr7dp2a0r86023weszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66rc3wjf</id>
    
      <title type="html">How AI Coding Tools Crushed the Endpoint Security Fortress ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqstqqc8fz6gxkdckhvf77c3smsdfuv9annrn3pr7dp2a0r86023weszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66rc3wjf" />
    <content type="html">
      How AI Coding Tools Crushed the Endpoint Security Fortress&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.darkreading.com/application-security/ai-coding-tools-endpoint-security&#34;&gt;https://www.darkreading.com/application-security/ai-coding-tools-endpoint-security&lt;/a&gt;
    </content>
    <updated>2026-04-02T22:42:11&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs9aw0x92200j26spznqdvmqxm55xrm45es866xvhj57an97talnjgzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t662cr7dv</id>
    
      <title type="html">Over 14,000 F5 BIG-IP APM instances still exposed to RCE attacks ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs9aw0x92200j26spznqdvmqxm55xrm45es866xvhj57an97talnjgzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t662cr7dv" />
    <content type="html">
      Over 14,000 F5 BIG-IP APM instances still exposed to RCE attacks&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/over-14-000-f5-big-ip-apm-instances-still-exposed-to-rce-attacks/&#34;&gt;https://www.bleepingcomputer.com/news/security/over-14-000-f5-big-ip-apm-instances-still-exposed-to-rce-attacks/&lt;/a&gt;
    </content>
    <updated>2026-04-02T20:10:15&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsy3p8h93vx9fdgtf05kmjn6w4uddz27gpq524vlvad30xxthcs8cszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t6667q0e9</id>
    
      <title type="html">Breakdown: How TeamPCP hid malware inside WAV files using audio ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsy3p8h93vx9fdgtf05kmjn6w4uddz27gpq524vlvad30xxthcs8cszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t6667q0e9" />
    <content type="html">
      Breakdown: How TeamPCP hid malware inside WAV files using audio steganography&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.reddit.com/r/netsec/comments/1s6weca/breakdown_how_teampcp_hid_malware_inside_wav/&#34;&gt;https://www.reddit.com/r/netsec/comments/1s6weca/breakdown_how_teampcp_hid_malware_inside_wav/&lt;/a&gt;
    </content>
    <updated>2026-04-02T17:02:10&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs2j76az8mkqqz98v7jl4jddaflr80vxa7905vpjyjexw7qfxepergzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66ueru70</id>
    
      <title type="html">You’re Not Supposed To ShareFile With Everyone (Progress ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs2j76az8mkqqz98v7jl4jddaflr80vxa7905vpjyjexw7qfxepergzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66ueru70" />
    <content type="html">
      You’re Not Supposed To ShareFile With Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 &amp;amp; CVE-2026-2701) - watchTowr Labs&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.reddit.com/r/netsec/comments/1saebwi/youre_not_supposed_to_sharefile_with_everyone/&#34;&gt;https://www.reddit.com/r/netsec/comments/1saebwi/youre_not_supposed_to_sharefile_with_everyone/&lt;/a&gt;
    </content>
    <updated>2026-04-02T14:04:22&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsgxx8gugamm3hnzsegmj3kmffe69trnjecuec2ndt3snz8m8meceszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66kx0djr</id>
    
      <title type="html">The Triple-Headed Dragon: Inside the Three-Cluster Chinese ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsgxx8gugamm3hnzsegmj3kmffe69trnjecuec2ndt3snz8m8meceszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66kx0djr" />
    <content type="html">
      The Triple-Headed Dragon: Inside the Three-Cluster Chinese Cyberespionage Campaign Targeting SE Asia&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityonline.info/stately-taurus-southeast-asia-cyberespionage-three-clusters-unit-42/&#34;&gt;https://securityonline.info/stately-taurus-southeast-asia-cyberespionage-three-clusters-unit-42/&lt;/a&gt;
    </content>
    <updated>2026-04-02T12:00:09&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsxyycj3e2qn8jfuvzfcs0ja3xt332t4y3mqy4xvjg0d4g90q26dcgzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66j3k683</id>
    
      <title type="html">&amp;#39;NoVoice&amp;#39; Android malware on Google Play infected 2.3 ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsxyycj3e2qn8jfuvzfcs0ja3xt332t4y3mqy4xvjg0d4g90q26dcgzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66j3k683" />
    <content type="html">
      &amp;#39;NoVoice&amp;#39; Android malware on Google Play infected 2.3 million devices&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/novoice-android-malware-on-google-play-infected-23-million-devices/&#34;&gt;https://www.bleepingcomputer.com/news/security/novoice-android-malware-on-google-play-infected-23-million-devices/&lt;/a&gt;
    </content>
    <updated>2026-04-02T09:34:06&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsdspsrmt4lwypsr9kjt3tnvs798zgn4kaq35kqp6hldlqd6983prszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t669r403q</id>
    
      <title type="html">Axios NPM Package Compromised in Precision Attack ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsdspsrmt4lwypsr9kjt3tnvs798zgn4kaq35kqp6hldlqd6983prszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t669r403q" />
    <content type="html">
      Axios NPM Package Compromised in Precision Attack&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.darkreading.com/application-security/axios-npm-package-compromised-precision-attack&#34;&gt;https://www.darkreading.com/application-security/axios-npm-package-compromised-precision-attack&lt;/a&gt;
    </content>
    <updated>2026-04-02T05:28:31&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs0yzumz9agmsjh8r5tayxa8wfkv6lnpcf3e6l8pt6akzs8u2ucd3czyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66vspu8n</id>
    
      <title type="html">New EvilTokens service fuels Microsoft device code phishing ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs0yzumz9agmsjh8r5tayxa8wfkv6lnpcf3e6l8pt6akzs8u2ucd3czyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66vspu8n" />
    <content type="html">
      New EvilTokens service fuels Microsoft device code phishing attacks&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/new-eviltokens-service-fuels-microsoft-device-code-phishing-attacks/&#34;&gt;https://www.bleepingcomputer.com/news/security/new-eviltokens-service-fuels-microsoft-device-code-phishing-attacks/&lt;/a&gt;
    </content>
    <updated>2026-04-02T03:22:11&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsz825dmd4v24qjjwam7wamwauj6t0nqteukzsk3pl5rkgljg0x9wgzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66fnfngz</id>
    
      <title type="html">Takedown-Proof: Inside the Ethereum-Powered “EtherRAT” and ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsz825dmd4v24qjjwam7wamwauj6t0nqteukzsk3pl5rkgljg0x9wgzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66fnfngz" />
    <content type="html">
      Takedown-Proof: Inside the Ethereum-Powered “EtherRAT” and North Korea’s New Blockchain Backdoor&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityonline.info/etherrat-malware-ethereum-blockchain-c2-etherhiding/&#34;&gt;https://securityonline.info/etherrat-malware-ethereum-blockchain-c2-etherhiding/&lt;/a&gt;
    </content>
    <updated>2026-04-02T00:41:17&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs9289m3xyeuwp8rz4tu0ckzfzke98ksa3g364etfncdgx0gjj4sjszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66043lhs</id>
    
      <title type="html">Ghost in the Drone: Unauthenticated Shell Access in PX4 ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs9289m3xyeuwp8rz4tu0ckzfzke98ksa3g364etfncdgx0gjj4sjszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66043lhs" />
    <content type="html">
      Ghost in the Drone: Unauthenticated Shell Access in PX4 Autopilot’s 9.8 CVSS Nightmare&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityonline.info/px4-autopilot-mavlink-vulnerability-cve-2026-1579/&#34;&gt;https://securityonline.info/px4-autopilot-mavlink-vulnerability-cve-2026-1579/&lt;/a&gt;
    </content>
    <updated>2026-04-01T21:00:04&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs2f6l8qthn2tqj8nh5htutz2hjt9x6dcqpwr3066e49cgjgz2s6rqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t664z37f7</id>
    
      <title type="html">NocoBase Critical Alert: Sandbox Escape Grants Attackers Root ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs2f6l8qthn2tqj8nh5htutz2hjt9x6dcqpwr3066e49cgjgz2s6rqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t664z37f7" />
    <content type="html">
      NocoBase Critical Alert: Sandbox Escape Grants Attackers Root Access&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityonline.info/nocobase-critical-rce-sandbox-escape-cve-2026-34156/&#34;&gt;https://securityonline.info/nocobase-critical-rce-sandbox-escape-cve-2026-34156/&lt;/a&gt;
    </content>
    <updated>2026-04-01T17:00:27&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsxr34vuc227s2ku63aucrxq6w4meplnxau4fjtdnktau44qp8hcaszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66yd69vw</id>
    
      <title type="html">Axios supply chain attack chops away at npm trust ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsxr34vuc227s2ku63aucrxq6w4meplnxau4fjtdnktau44qp8hcaszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66yd69vw" />
    <content type="html">
      Axios supply chain attack chops away at npm trust&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.malwarebytes.com/blog/news/2026/03/axios-supply-chain-attack-chops-away-at-npm-trust&#34;&gt;https://www.malwarebytes.com/blog/news/2026/03/axios-supply-chain-attack-chops-away-at-npm-trust&lt;/a&gt;
    </content>
    <updated>2026-04-01T14:05:26&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs2ql9zvnxd86jlsxpgasvjf00ujszxluh8az8e9zyr8dugkqst56czyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66zl05xe</id>
    
      <title type="html">Exploited in the Wild: Google Issues Emergency Patch for Chrome ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs2ql9zvnxd86jlsxpgasvjf00ujszxluh8az8e9zyr8dugkqst56czyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66zl05xe" />
    <content type="html">
      Exploited in the Wild: Google Issues Emergency Patch for Chrome Zero-Day (CVE-2026-5281) in Dawn Component&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityonline.info/google-chrome-zero-day-patch-cve-2026-5281-exploited-in-the-wild/&#34;&gt;https://securityonline.info/google-chrome-zero-day-patch-cve-2026-5281-exploited-in-the-wild/&lt;/a&gt;
    </content>
    <updated>2026-04-01T12:03:46&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsptkp3vr58sa652w50mvthulh47fzhjcc7vygppkfcth5udhmxf8szyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66vncyfm</id>
    
      <title type="html">Hackers compromise Axios npm package to drop cross-platform ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsptkp3vr58sa652w50mvthulh47fzhjcc7vygppkfcth5udhmxf8szyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66vncyfm" />
    <content type="html">
      Hackers compromise Axios npm package to drop cross-platform malware&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/hackers-compromise-axios-npm-package-to-drop-cross-platform-malware/&#34;&gt;https://www.bleepingcomputer.com/news/security/hackers-compromise-axios-npm-package-to-drop-cross-platform-malware/&lt;/a&gt;
    </content>
    <updated>2026-04-01T09:53:08&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsftxcz0p52u5dayvugxrd5xhxfz235xfjg8zzkeql4jfqxaw7zgygzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66hxk6aw</id>
    
      <title type="html">LangDrained: Path traversal, SQL injection, and Deserialization ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsftxcz0p52u5dayvugxrd5xhxfz235xfjg8zzkeql4jfqxaw7zgygzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66hxk6aw" />
    <content type="html">
      LangDrained: Path traversal, SQL injection, and Deserialization of untrusted data in LangChain&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.reddit.com/r/netsec/comments/1s7jexg/langdrained_path_traversal_sql_injection_and/&#34;&gt;https://www.reddit.com/r/netsec/comments/1s7jexg/langdrained_path_traversal_sql_injection_and/&lt;/a&gt;
    </content>
    <updated>2026-04-01T07:42:13&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsrc2zz9r46fsqun0xqsljzl67wh2ffvyj2nz0khqdvwuwtx266f7qzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66yqvvsz</id>
    
      <title type="html">TrueChaos: The TrueConf Zero-Day That Turned Secure Updates Into ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsrc2zz9r46fsqun0xqsljzl67wh2ffvyj2nz0khqdvwuwtx266f7qzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66yqvvsz" />
    <content type="html">
      TrueChaos: The TrueConf Zero-Day That Turned Secure Updates Into a Government Espionage Backdoor&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityonline.info/trueconf-zero-day-vulnerability-cve-2026-3502-truechaos-campaign/&#34;&gt;https://securityonline.info/trueconf-zero-day-vulnerability-cve-2026-3502-truechaos-campaign/&lt;/a&gt;
    </content>
    <updated>2026-04-01T04:38:24&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqszdy6595mxuce7au30k9yzzmh83turjadn2ccef4wu940v293anxszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t660x42h9</id>
    
      <title type="html">One POST request, six API keys: breaking into popular MCP servers ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqszdy6595mxuce7au30k9yzzmh83turjadn2ccef4wu940v293anxszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t660x42h9" />
    <content type="html">
      One POST request, six API keys: breaking into popular MCP servers&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.reddit.com/r/netsec/comments/1s7tyuh/one_post_request_six_api_keys_breaking_into/&#34;&gt;https://www.reddit.com/r/netsec/comments/1s7tyuh/one_post_request_six_api_keys_breaking_into/&lt;/a&gt;
    </content>
    <updated>2026-04-01T04:25:25&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsx4yz6mywvgf582apcsphjuh8zn5lmlm4zp8we4e78evnp6c6ahyqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t665gd6eq</id>
    
      <title type="html">PSA: That &amp;#39;Disable NTLMv1&amp;#39; GPO you set years ago? It’s ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsx4yz6mywvgf582apcsphjuh8zn5lmlm4zp8we4e78evnp6c6ahyqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t665gd6eq" />
    <content type="html">
      PSA: That &amp;#39;Disable NTLMv1&amp;#39; GPO you set years ago? It’s lying to you. LmCompatibilityLevel set to 5 is not enough.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.reddit.com/r/netsec/comments/1s8wb2q/psa_that_disable_ntlmv1_gpo_you_set_years_ago_its/&#34;&gt;https://www.reddit.com/r/netsec/comments/1s8wb2q/psa_that_disable_ntlmv1_gpo_you_set_years_ago_its/&lt;/a&gt;
    </content>
    <updated>2026-04-01T04:17:52&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqswq2aqsjzfvd8zqllk9mfgx2q36ch7kjjqvzwe7qc8sk32e8e0d9czyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66nr60w0</id>
    
      <title type="html">TeamPCP Breaches Cloud, SaaS Instances With Stolen Credentials ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqswq2aqsjzfvd8zqllk9mfgx2q36ch7kjjqvzwe7qc8sk32e8e0d9czyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66nr60w0" />
    <content type="html">
      TeamPCP Breaches Cloud, SaaS Instances With Stolen Credentials&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.darkreading.com/cloud-security/teampcp-breaches-cloud-saas-instances-stolen-credentials&#34;&gt;https://www.darkreading.com/cloud-security/teampcp-breaches-cloud-saas-instances-stolen-credentials&lt;/a&gt;
    </content>
    <updated>2026-04-01T02:15:52&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs2wrltdg79c9aejt7w3j3cjnyrnt3u8vw9s5n3j6v9cj9ehsv3elszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66sv700l</id>
    
      <title type="html">Critical 9.3 CVSS RCE Vulnerability Hit in OpenTelemetry Java ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs2wrltdg79c9aejt7w3j3cjnyrnt3u8vw9s5n3j6v9cj9ehsv3elszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66sv700l" />
    <content type="html">
      Critical 9.3 CVSS RCE Vulnerability Hit in OpenTelemetry Java Agent&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityonline.info/opentelemetry-java-agent-rce-vulnerability-cve-2026-33701/&#34;&gt;https://securityonline.info/opentelemetry-java-agent-rce-vulnerability-cve-2026-33701/&lt;/a&gt;
    </content>
    <updated>2026-03-31T22:50:02&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs0eshkthd7vqt87awy7qtalu0k5y326a08cwpsh273qt7a3he0dmczyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66tp7w55</id>
    
      <title type="html">Critical CrewAI Vulnerabilities Allow RCE and Sandbox Escapes via ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs0eshkthd7vqt87awy7qtalu0k5y326a08cwpsh273qt7a3he0dmczyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66tp7w55" />
    <content type="html">
      Critical CrewAI Vulnerabilities Allow RCE and Sandbox Escapes via Prompt Injection&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityonline.info/crewai-vulnerabilities-rce-ssrf-sandbox-escape-cve-2026/&#34;&gt;https://securityonline.info/crewai-vulnerabilities-rce-ssrf-sandbox-escape-cve-2026/&lt;/a&gt;
    </content>
    <updated>2026-03-31T16:03:34&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsrvmju0sx9xr9k6qjggq9yex5wk23e7qqsclay85elzd08sceydkszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66awsk75</id>
    
      <title type="html">The 25-Second Heist: Inside FAUX#ELEVATE’s “Inflated” ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsrvmju0sx9xr9k6qjggq9yex5wk23e7qqsclay85elzd08sceydkszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66awsk75" />
    <content type="html">
      The 25-Second Heist: Inside FAUX#ELEVATE’s “Inflated” Phishing Attack on French Corporations&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityonline.info/faux-elevate-malware-campaign-french-corporate-phishing/&#34;&gt;https://securityonline.info/faux-elevate-malware-campaign-french-corporate-phishing/&lt;/a&gt;
    </content>
    <updated>2026-03-31T14:01:42&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs0fruf98ymscnrftg7ppmq70s3rlhyfc0a05eanyf92jz3jp83uhqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66t6sey5</id>
    
      <title type="html">The Instant Weaponization of Oracle’s 10.0 CVSS ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs0fruf98ymscnrftg7ppmq70s3rlhyfc0a05eanyf92jz3jp83uhqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66t6sey5" />
    <content type="html">
      The Instant Weaponization of Oracle’s 10.0 CVSS “Zero-Day-Like” Flaw&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityonline.info/oracle-weblogic-rce-vulnerability-cve-2026-21962-exploitation/&#34;&gt;https://securityonline.info/oracle-weblogic-rce-vulnerability-cve-2026-21962-exploitation/&lt;/a&gt;
    </content>
    <updated>2026-03-31T11:54:12&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqst86me5jklu4a50gh894lppk4d33z2x9hm2qnxnxc5g06w0cs3vuqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66u295p6</id>
    
      <title type="html">The Malware That Chats Back: Inside G DATA’s Real-Time Notepad ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqst86me5jklu4a50gh894lppk4d33z2x9hm2qnxnxc5g06w0cs3vuqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66u295p6" />
    <content type="html">
      The Malware That Chats Back: Inside G DATA’s Real-Time Notepad Encounter with the “Kiss Loader” Author&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityonline.info/kiss-loader-malware-notepad-chat-early-bird-injection-analysis/&#34;&gt;https://securityonline.info/kiss-loader-malware-notepad-chat-early-bird-injection-analysis/&lt;/a&gt;
    </content>
    <updated>2026-03-31T09:51:37&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsyvywznjk7aklfqr98gdpjpjksa7yeckkpdzcrs5wph79wlw8kqpszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t6697ungc</id>
    
      <title type="html">AI-Powered Dependency Decisions Introduce, Ignore Security Bugs ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsyvywznjk7aklfqr98gdpjpjksa7yeckkpdzcrs5wph79wlw8kqpszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t6697ungc" />
    <content type="html">
      AI-Powered Dependency Decisions Introduce, Ignore Security Bugs&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.darkreading.com/application-security/ai-powered-dependency-decisions-security-bugs&#34;&gt;https://www.darkreading.com/application-security/ai-powered-dependency-decisions-security-bugs&lt;/a&gt;
    </content>
    <updated>2026-03-31T07:03:20&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsfd5jrzxxtm5ve892vk3pz2t9hhghdqm64lrs87g0hfmv5dpt2lcqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66myz53j</id>
    
      <title type="html">Axios Under Siege: Critical npm Supply Chain Attack Hijacks Lead ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsfd5jrzxxtm5ve892vk3pz2t9hhghdqm64lrs87g0hfmv5dpt2lcqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66myz53j" />
    <content type="html">
      Axios Under Siege: Critical npm Supply Chain Attack Hijacks Lead Maintainer to Drop Multi-Platform RAT&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityonline.info/axios-npm-supply-chain-attack-poisoned-versions-rat/&#34;&gt;https://securityonline.info/axios-npm-supply-chain-attack-poisoned-versions-rat/&lt;/a&gt;
    </content>
    <updated>2026-03-31T04:57:26&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsqzpjdqqzpwju9g0fa08akpu44ymcslfduevxq25u5856zjshyyxszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66wta4v4</id>
    
      <title type="html">AI-Powered &amp;#39;DeepLoad&amp;#39; Malware Steals Credentials, Evades ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsqzpjdqqzpwju9g0fa08akpu44ymcslfduevxq25u5856zjshyyxszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66wta4v4" />
    <content type="html">
      AI-Powered &amp;#39;DeepLoad&amp;#39; Malware Steals Credentials, Evades Detection&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.darkreading.com/cyberattacks-data-breaches/ai-powered-deepload-steals-credentials-evades-detection&#34;&gt;https://www.darkreading.com/cyberattacks-data-breaches/ai-powered-deepload-steals-credentials-evades-detection&lt;/a&gt;
    </content>
    <updated>2026-03-31T02:48:07&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsf5796v02wy7n7ke0fa8hfwaxhhdvr5uum55aqh89syfzw5h4vwhqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t664zlyds</id>
    
      <title type="html">Scriban’s “Leaky” Cache: A 9.1 CVSS Sandbox Escape Hits 40 ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsf5796v02wy7n7ke0fa8hfwaxhhdvr5uum55aqh89syfzw5h4vwhqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t664zlyds" />
    <content type="html">
      Scriban’s “Leaky” Cache: A 9.1 CVSS Sandbox Escape Hits 40 Million .NET Installs&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityonline.info/scriban-dotnet-vulnerability-sandbox-escape-cache-bypass/&#34;&gt;https://securityonline.info/scriban-dotnet-vulnerability-sandbox-escape-cache-bypass/&lt;/a&gt;
    </content>
    <updated>2026-03-31T00:26:11&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsqxhtx3vms3cw9as84vvaxv2f0ntnu7e8ace4k43rpag9x50e6agczyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t663dstzc</id>
    
      <title type="html">The 30-Year Glitch: RCE and ARM Exploits Uncovered in libpng ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsqxhtx3vms3cw9as84vvaxv2f0ntnu7e8ace4k43rpag9x50e6agczyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t663dstzc" />
    <content type="html">
      The 30-Year Glitch: RCE and ARM Exploits Uncovered in libpng Reference Library&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityonline.info/libpng-vulnerability-rce-arm-neon-cve-2026-33636-cve-2026-33416/&#34;&gt;https://securityonline.info/libpng-vulnerability-rce-arm-neon-cve-2026-33636-cve-2026-33416/&lt;/a&gt;
    </content>
    <updated>2026-03-30T22:20:31&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsr6y4y3glvn3wj3euptau6mhptdcpkjv9npsvsd3cqhcn5efdelnszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66rtpts7</id>
    
      <title type="html">The Weakest Link: Popular Node.js Config Library “Convict” ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsr6y4y3glvn3wj3euptau6mhptdcpkjv9npsvsd3cqhcn5efdelnszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66rtpts7" />
    <content type="html">
      The Weakest Link: Popular Node.js Config Library “Convict” Hit by Prototype Pollution&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityonline.info/node-convict-prototype-pollution-vulnerability-cve-2026-33864/&#34;&gt;https://securityonline.info/node-convict-prototype-pollution-vulnerability-cve-2026-33864/&lt;/a&gt;
    </content>
    <updated>2026-03-30T20:18:33&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsdz26pmkdu20v6v0q5d94nfv4h4m08lw5vz9rq9vakzs5rph77ddqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66p6syu4</id>
    
      <title type="html">High-Severity RCE Discovered in Foreman’s WebSocket Proxy ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsdz26pmkdu20v6v0q5d94nfv4h4m08lw5vz9rq9vakzs5rph77ddqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66p6syu4" />
    <content type="html">
      High-Severity RCE Discovered in Foreman’s WebSocket Proxy&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityonline.info/foreman-rce-vulnerability-cve-2026-1961-command-injection/&#34;&gt;https://securityonline.info/foreman-rce-vulnerability-cve-2026-1961-command-injection/&lt;/a&gt;
    </content>
    <updated>2026-03-30T18:08:18&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs0k7f6sfld74vn5uf4c77nrs4qemf3sdu7umjerw55utvmn4ks44szyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66d5hah3</id>
    
      <title type="html">Critical Fortinet Forticlient EMS flaw now exploited in attacks ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs0k7f6sfld74vn5uf4c77nrs4qemf3sdu7umjerw55utvmn4ks44szyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66d5hah3" />
    <content type="html">
      Critical Fortinet Forticlient EMS flaw now exploited in attacks&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/critical-fortinet-forticlient-ems-flaw-now-exploited-in-attacks/&#34;&gt;https://www.bleepingcomputer.com/news/security/critical-fortinet-forticlient-ems-flaw-now-exploited-in-attacks/&lt;/a&gt;
    </content>
    <updated>2026-03-30T16:08:07&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs2zm07y24fckqfwfddlma9n3pts84wd5g72jpy34ezd3ytuehzpxszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66yetqv2</id>
    
      <title type="html">The CVE Watchtower: Weekly Threat Intelligence Briefing (March 23 ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs2zm07y24fckqfwfddlma9n3pts84wd5g72jpy34ezd3ytuehzpxszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66yetqv2" />
    <content type="html">
      The CVE Watchtower: Weekly Threat Intelligence Briefing (March 23 – March 29, 2026)&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityonline.info/weekly-vulnerability-roundup-march-23-29-2026-cisa-kev-trivy/&#34;&gt;https://securityonline.info/weekly-vulnerability-roundup-march-23-29-2026-cisa-kev-trivy/&lt;/a&gt;
    </content>
    <updated>2026-03-30T14:06:41&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsdp6lv502rvt62s4j8lakzdfrms7xmly5tm4meejsm06j3gg645lszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66dxu9dn</id>
    
      <title type="html">The “Gentlemen” Ransomware Toolkit and the Lethal z1.bat ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsdp6lv502rvt62s4j8lakzdfrms7xmly5tm4meejsm06j3gg645lszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66dxu9dn" />
    <content type="html">
      The “Gentlemen” Ransomware Toolkit and the Lethal z1.bat Pre-Encryption Weapon&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityonline.info/the-gentlemen-ransomware-toolkit-z1-bat-scorched-earth-script/&#34;&gt;https://securityonline.info/the-gentlemen-ransomware-toolkit-z1-bat-scorched-earth-script/&lt;/a&gt;
    </content>
    <updated>2026-03-30T11:31:36&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsv4t8k5x4cvf8jt9msqlse7s5vzpwgxfktk5cexgdjfvdwvm0xexqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66y00jdf</id>
    
      <title type="html">SideWinder Espionage Campaign Expands Across Southeast Asia ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsv4t8k5x4cvf8jt9msqlse7s5vzpwgxfktk5cexgdjfvdwvm0xexqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66y00jdf" />
    <content type="html">
      SideWinder Espionage Campaign Expands Across Southeast Asia&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.darkreading.com/threat-intelligence/sidewinder-espionage-campaign-expands-across-southeast-asia&#34;&gt;https://www.darkreading.com/threat-intelligence/sidewinder-espionage-campaign-expands-across-southeast-asia&lt;/a&gt;
    </content>
    <updated>2026-03-30T11:00:39&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsdsxpk3r884avye8mx3hkmkj06arfqxmphzn7vn2a8qsh97ut8z3gzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t662h5ev6</id>
    
      <title type="html">Feds Disrupt IoT Botnets Behind Huge DDoS Attacks ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsdsxpk3r884avye8mx3hkmkj06arfqxmphzn7vn2a8qsh97ut8z3gzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t662h5ev6" />
    <content type="html">
      Feds Disrupt IoT Botnets Behind Huge DDoS Attacks&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://krebsonsecurity.com/2026/03/feds-disrupt-iot-botnets-behind-huge-ddos-attacks/&#34;&gt;https://krebsonsecurity.com/2026/03/feds-disrupt-iot-botnets-behind-huge-ddos-attacks/&lt;/a&gt;
    </content>
    <updated>2026-03-30T08:26:30&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqswc42xyh3jfk6azafm7hskv7t9xuh3vy7a0v92hvhu70lvlt5kryczyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t668tk3sw</id>
    
      <title type="html">File read flaw in Smart Slider plugin impacts 500K WordPress ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqswc42xyh3jfk6azafm7hskv7t9xuh3vy7a0v92hvhu70lvlt5kryczyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t668tk3sw" />
    <content type="html">
      File read flaw in Smart Slider plugin impacts 500K WordPress sites&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/file-read-flaw-in-smart-slider-plugin-impacts-500k-wordpress-sites/&#34;&gt;https://www.bleepingcomputer.com/news/security/file-read-flaw-in-smart-slider-plugin-impacts-500k-wordpress-sites/&lt;/a&gt;
    </content>
    <updated>2026-03-30T06:19:02&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs278a74w0k4d40aq7pr969werwzy4hwf0luta3sxm90rfzquhm0dczyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66exzpuw</id>
    
      <title type="html">Hacking a Robot Vacuum ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs278a74w0k4d40aq7pr969werwzy4hwf0luta3sxm90rfzquhm0dczyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66exzpuw" />
    <content type="html">
      Hacking a Robot Vacuum&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.schneier.com/blog/archives/2026/03/hacking-a-robot-vacuum.html&#34;&gt;https://www.schneier.com/blog/archives/2026/03/hacking-a-robot-vacuum.html&lt;/a&gt;
    </content>
    <updated>2026-03-30T04:08:20&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs0y9zkq6z0raeae0rmykl62wpe5cyfy6czpaee57e5fvzlp742vvszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66kfad7t</id>
    
      <title type="html">Warlock Ransomware Group Augments Post-Exploitation Activities ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs0y9zkq6z0raeae0rmykl62wpe5cyfy6czpaee57e5fvzlp742vvszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66kfad7t" />
    <content type="html">
      Warlock Ransomware Group Augments Post-Exploitation Activities&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.darkreading.com/threat-intelligence/warlock-ransomware-post-exploitation-activities&#34;&gt;https://www.darkreading.com/threat-intelligence/warlock-ransomware-post-exploitation-activities&lt;/a&gt;
    </content>
    <updated>2026-03-30T04:00:11&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsg38pp2fcuqs9klxl5vqtpfyq6valevnm04a77h07syn2fvvp87hszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66gt9008</id>
    
      <title type="html">Coruna, DarkSword &amp;amp;amp; Democratizing Nation-State Exploit ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsg38pp2fcuqs9klxl5vqtpfyq6valevnm04a77h07syn2fvvp87hszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66gt9008" />
    <content type="html">
      Coruna, DarkSword &amp;amp;amp; Democratizing Nation-State Exploit Kits&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.darkreading.com/endpoint-security/coruna-darksword-democratizing-nation-state-exploit-kits&#34;&gt;https://www.darkreading.com/endpoint-security/coruna-darksword-democratizing-nation-state-exploit-kits&lt;/a&gt;
    </content>
    <updated>2026-03-29T22:35:01&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs8lrcjzwfuapl78ssh758tj4rl40u60k650gegue6v5dvs37qvtzszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66qqymag</id>
    
      <title type="html">SQL to SSH: Critical 9.1 CVSS RCE in Grafana Turns Monitoring ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs8lrcjzwfuapl78ssh758tj4rl40u60k650gegue6v5dvs37qvtzszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66qqymag" />
    <content type="html">
      SQL to SSH: Critical 9.1 CVSS RCE in Grafana Turns Monitoring into a Remote Hijack&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityonline.info/grafana-critical-rce-vulnerability-cve-2026-27876-sql-expressions/&#34;&gt;https://securityonline.info/grafana-critical-rce-vulnerability-cve-2026-27876-sql-expressions/&lt;/a&gt;
    </content>
    <updated>2026-03-29T19:34:53&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsywu4eg6e7nmhkxs58kd3uu7x78qj9q53g4whg0fthgz4nqcle6aczyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66smwq3n</id>
    
      <title type="html">Inside a Modern Fraud Attack: From Bot Signups to Account ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsywu4eg6e7nmhkxs58kd3uu7x78qj9q53g4whg0fthgz4nqcle6aczyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66smwq3n" />
    <content type="html">
      Inside a Modern Fraud Attack: From Bot Signups to Account Takeovers&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/inside-a-modern-fraud-attack-from-bot-signups-to-account-takeovers/&#34;&gt;https://www.bleepingcomputer.com/news/security/inside-a-modern-fraud-attack-from-bot-signups-to-account-takeovers/&lt;/a&gt;
    </content>
    <updated>2026-03-29T16:56:17&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs86y5zp4m5le8pes7nfm6xm9hwhtgpsx3j9nk5d2rzs6z9qx7s3wczyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66zsnpnx</id>
    
      <title type="html">Trivy Supply Chain Attack Targets CI/CD Secrets ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs86y5zp4m5le8pes7nfm6xm9hwhtgpsx3j9nk5d2rzs6z9qx7s3wczyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66zsnpnx" />
    <content type="html">
      Trivy Supply Chain Attack Targets CI/CD Secrets&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.darkreading.com/application-security/trivy-supply-chain-attack-targets-ci-cd-secrets&#34;&gt;https://www.darkreading.com/application-security/trivy-supply-chain-attack-targets-ci-cd-secrets&lt;/a&gt;
    </content>
    <updated>2026-03-29T14:42:13&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsvqtrx66vj444x86xaj6zklww7sflmrkn9t6sq49uphywhgrehlvczyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66r0qlrr</id>
    
      <title type="html">Critical 9.3 CVSS Auth Bypass and XSS Flaws Hit MantisBT ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsvqtrx66vj444x86xaj6zklww7sflmrkn9t6sq49uphywhgrehlvczyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66r0qlrr" />
    <content type="html">
      Critical 9.3 CVSS Auth Bypass and XSS Flaws Hit MantisBT&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityonline.info/mantisbt-critical-authentication-bypass-vulnerability-cve-2026-30849/&#34;&gt;https://securityonline.info/mantisbt-critical-authentication-bypass-vulnerability-cve-2026-30849/&lt;/a&gt;
    </content>
    <updated>2026-03-29T10:28:21&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs2f0ypqs0w0gugn29p7x25m05q8ejkdyj26s60knzk8zre3v2lwrgzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66ce6al7</id>
    
      <title type="html">Meet Khaled Mohamed: the bug hunter who found a Microsoft flaw ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs2f0ypqs0w0gugn29p7x25m05q8ejkdyj26s60knzk8zre3v2lwrgzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66ce6al7" />
    <content type="html">
      Meet Khaled Mohamed: the bug hunter who found a Microsoft flaw&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.malwarebytes.com/blog/bugs/2026/03/meet-khaled-mohamed-the-bug-hunter-who-found-a-microsoft-flaw&#34;&gt;https://www.malwarebytes.com/blog/bugs/2026/03/meet-khaled-mohamed-the-bug-hunter-who-found-a-microsoft-flaw&lt;/a&gt;
    </content>
    <updated>2026-03-29T07:56:24&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsql0hlwgt2lyr5tw39thydk82m8s926hptydpx53pnzt66cvd3gpgzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66edjlnt</id>
    
      <title type="html">GitHub &amp;#39;OpenClaw Deployer&amp;#39; Repo Delivers Trojan Instead ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsql0hlwgt2lyr5tw39thydk82m8s926hptydpx53pnzt66cvd3gpgzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66edjlnt" />
    <content type="html">
      GitHub &amp;#39;OpenClaw Deployer&amp;#39; Repo Delivers Trojan Instead&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.darkreading.com/application-security/github-openclaw-deployer-repo-delivers-trojan&#34;&gt;https://www.darkreading.com/application-security/github-openclaw-deployer-repo-delivers-trojan&lt;/a&gt;
    </content>
    <updated>2026-03-29T05:54:19&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsgs33qcntapftke402ep0vfz2c0hdav49lxc69vpacyvxuyc4setszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66jv7u6k</id>
    
      <title type="html">CVE-2026-33656: EspoCRM ≤ 9.3.3 — Formula engine ACL gap &#43; ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsgs33qcntapftke402ep0vfz2c0hdav49lxc69vpacyvxuyc4setszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66jv7u6k" />
    <content type="html">
      CVE-2026-33656: EspoCRM ≤ 9.3.3 — Formula engine ACL gap &#43; path traversal → authenticated RCE (full write-up &#43; PoC)&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.reddit.com/r/netsec/comments/1s39ujn/cve202633656_espocrm_933_formula_engine_acl_gap/&#34;&gt;https://www.reddit.com/r/netsec/comments/1s39ujn/cve202633656_espocrm_933_formula_engine_acl_gap/&lt;/a&gt;
    </content>
    <updated>2026-03-29T05:40:54&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs22qykgxunelwm9fkdwkskkf4j9gc2f8p9q7x243yn53auawac2zqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66rh2j0e</id>
    
      <title type="html">Chaining file upload bypass and stored XSS to create admin ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs22qykgxunelwm9fkdwkskkf4j9gc2f8p9q7x243yn53auawac2zqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66rh2j0e" />
    <content type="html">
      Chaining file upload bypass and stored XSS to create admin accounts: walkthrough with Docker PoC lab&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.reddit.com/r/netsec/comments/1s5zzw1/chaining_file_upload_bypass_and_stored_xss_to/&#34;&gt;https://www.reddit.com/r/netsec/comments/1s5zzw1/chaining_file_upload_bypass_and_stored_xss_to/&lt;/a&gt;
    </content>
    <updated>2026-03-29T05:33:21&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs8hdt4zjfwp8degvagpjgsj78qu65g80y9ujr5gycy5d3cy92p74czyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66gj57cq</id>
    
      <title type="html">Checkmarx KICS Code Scanner Targeted in Widening Supply Chain Hit ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs8hdt4zjfwp8degvagpjgsj78qu65g80y9ujr5gycy5d3cy92p74czyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66gj57cq" />
    <content type="html">
      Checkmarx KICS Code Scanner Targeted in Widening Supply Chain Hit&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.darkreading.com/application-security/checkmarx-kics-code-scanner-widening-supply-chain&#34;&gt;https://www.darkreading.com/application-security/checkmarx-kics-code-scanner-widening-supply-chain&lt;/a&gt;
    </content>
    <updated>2026-03-29T03:12:18&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs976mv9s8ns3g5yla5xfpe9vcrcwcftdrdzj8j9l00jlf8uxm9hgszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66af6yyf</id>
    
      <title type="html">New Infinity Stealer malware grabs macOS data via ClickFix lures ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs976mv9s8ns3g5yla5xfpe9vcrcwcftdrdzj8j9l00jlf8uxm9hgszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66af6yyf" />
    <content type="html">
      New Infinity Stealer malware grabs macOS data via ClickFix lures&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/new-infinity-stealer-malware-grabs-macos-data-via-clickfix-lures/&#34;&gt;https://www.bleepingcomputer.com/news/security/new-infinity-stealer-malware-grabs-macos-data-via-clickfix-lures/&lt;/a&gt;
    </content>
    <updated>2026-03-28T23:53:53&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs9xa8u4xgjy90f5pdyujt36w00g6pyd5s8dgantkd3gmgxgul0exszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66z3d0tx</id>
    
      <title type="html">‘CanisterWorm’ Springs Wiper Attack Targeting Iran ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs9xa8u4xgjy90f5pdyujt36w00g6pyd5s8dgantkd3gmgxgul0exszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66z3d0tx" />
    <content type="html">
      ‘CanisterWorm’ Springs Wiper Attack Targeting Iran&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://krebsonsecurity.com/2026/03/canisterworm-springs-wiper-attack-targeting-iran/&#34;&gt;https://krebsonsecurity.com/2026/03/canisterworm-springs-wiper-attack-targeting-iran/&lt;/a&gt;
    </content>
    <updated>2026-03-28T21:53:41&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsvczda8v40c7l6fpz7t00xeg70ylm8af27svg74rrrd77a6hkt9lszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66j9cnck</id>
    
      <title type="html">Zabbix API Vulnerability: High-Severity SQL Injection Threatens ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsvczda8v40c7l6fpz7t00xeg70ylm8af27svg74rrrd77a6hkt9lszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66j9cnck" />
    <content type="html">
      Zabbix API Vulnerability: High-Severity SQL Injection Threatens Network Monitoring Security&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityonline.info/zabbix-api-sql-injection-vulnerability-cve-2026-23921/&#34;&gt;https://securityonline.info/zabbix-api-sql-injection-vulnerability-cve-2026-23921/&lt;/a&gt;
    </content>
    <updated>2026-03-28T19:53:25&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqstdf70ay8za7cuqe94sxl7rxa3sxzj2wsxcpy8cwyjr30mljx7jrqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66mw6m8p</id>
    
      <title type="html">High-Severity strongSwan Flaw Enables Remote VPN Gateway Crashes ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqstdf70ay8za7cuqe94sxl7rxa3sxzj2wsxcpy8cwyjr30mljx7jrqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66mw6m8p" />
    <content type="html">
      High-Severity strongSwan Flaw Enables Remote VPN Gateway Crashes&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityonline.info/strongswan-vpn-cve-2026-25075-eap-ttls-dos-vulnerability/&#34;&gt;https://securityonline.info/strongswan-vpn-cve-2026-25075-eap-ttls-dos-vulnerability/&lt;/a&gt;
    </content>
    <updated>2026-03-28T17:26:05&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsfdfl22xld2sykazsuexpeqqavx2mcx8k56clewt2rkk7whgg5j7qzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66gvae48</id>
    
      <title type="html">Criminals are renting virtual phones to bypass bank security ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsfdfl22xld2sykazsuexpeqqavx2mcx8k56clewt2rkk7whgg5j7qzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66gvae48" />
    <content type="html">
      Criminals are renting virtual phones to bypass bank security&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.malwarebytes.com/blog/news/2026/03/criminals-are-renting-virtual-phones-to-bypass-bank-security&#34;&gt;https://www.malwarebytes.com/blog/news/2026/03/criminals-are-renting-virtual-phones-to-bypass-bank-security&lt;/a&gt;
    </content>
    <updated>2026-03-28T15:17:15&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs0647ez937x2tv3j5k30ydmpyxhasdszy9usy9xeswx5mjq56ypvczyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66mrqaln</id>
    
      <title type="html">Bogus Avast website fakes virus scan, installs Venom Stealer ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs0647ez937x2tv3j5k30ydmpyxhasdszy9usy9xeswx5mjq56ypvczyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66mrqaln" />
    <content type="html">
      Bogus Avast website fakes virus scan, installs Venom Stealer instead&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.malwarebytes.com/blog/threat-intel/2026/03/bogus-avast-website-fakes-virus-scan-installs-venom-stealer-instead&#34;&gt;https://www.malwarebytes.com/blog/threat-intel/2026/03/bogus-avast-website-fakes-virus-scan-installs-venom-stealer-instead&lt;/a&gt;
    </content>
    <updated>2026-03-28T13:10:07&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsd0ap4wuvy24mahytclc9d3txt28n3fc9p65rjm7rket35gmj4ragzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t665ev6xv</id>
    
      <title type="html">Critical 9.8 CVSS SpEL Injection and SSRF Flaws Hit Spring AI ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsd0ap4wuvy24mahytclc9d3txt28n3fc9p65rjm7rket35gmj4ragzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t665ev6xv" />
    <content type="html">
      Critical 9.8 CVSS SpEL Injection and SSRF Flaws Hit Spring AI Framework&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityonline.info/spring-ai-security-vulnerabilities-rce-ssrf-spel-injection-patch/&#34;&gt;https://securityonline.info/spring-ai-security-vulnerabilities-rce-ssrf-spel-injection-patch/&lt;/a&gt;
    </content>
    <updated>2026-03-28T10:47:05&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsw50r4w8vtvmhqk9kf0akelwcuh97k3ve2sc2r4lqsk3m9dapq6nszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t666slzr5</id>
    
      <title type="html">Telnyx package on PyPI compromised by TeamPCP. WAV steganography ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsw50r4w8vtvmhqk9kf0akelwcuh97k3ve2sc2r4lqsk3m9dapq6nszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t666slzr5" />
    <content type="html">
      Telnyx package on PyPI compromised by TeamPCP. WAV steganography used for payload delivery&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.reddit.com/r/netsec/comments/1s5qot0/telnyx_package_on_pypi_compromised_by_teampcp_wav/&#34;&gt;https://www.reddit.com/r/netsec/comments/1s5qot0/telnyx_package_on_pypi_compromised_by_teampcp_wav/&lt;/a&gt;
    </content>
    <updated>2026-03-28T10:33:11&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsws5e5262u4ku0aghyja62ec94f3xu540yraj3evxhlc4m06qrgsqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t669vj5f2</id>
    
      <title type="html">China Upgrades the Backdoor It Uses to Spy on Telcos Globally ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsws5e5262u4ku0aghyja62ec94f3xu540yraj3evxhlc4m06qrgsqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t669vj5f2" />
    <content type="html">
      China Upgrades the Backdoor It Uses to Spy on Telcos Globally&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.darkreading.com/threat-intelligence/china-upgrades-backdoor-spy-telcos&#34;&gt;https://www.darkreading.com/threat-intelligence/china-upgrades-backdoor-spy-telcos&lt;/a&gt;
    </content>
    <updated>2026-03-28T08:32:34&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsf9uskkud77allkkmz250xh674rpau70q88z4j4p6myhunswsrsrgzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66ds9tez</id>
    
      <title type="html">CRITICAL ALERT: Telegram Vulnerability “ZDI-CAN-30207” ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsf9uskkud77allkkmz250xh674rpau70q88z4j4p6myhunswsrsrgzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66ds9tez" />
    <content type="html">
      CRITICAL ALERT: Telegram Vulnerability “ZDI-CAN-30207” Exposes Users to Zero-Click Attacks&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityonline.info/telegram-critical-zero-click-vulnerability-zdi-can-30207/&#34;&gt;https://securityonline.info/telegram-critical-zero-click-vulnerability-zdi-can-30207/&lt;/a&gt;
    </content>
    <updated>2026-03-28T06:11:23&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsdk0wn8xqdg250svp2xxflqy0ddcujhtl6w70d5rkakhlsrujfspszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66vndn8v</id>
    
      <title type="html">SANS: Top 5 Most Dangerous New Attack Techniques to Watch ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsdk0wn8xqdg250svp2xxflqy0ddcujhtl6w70d5rkakhlsrujfspszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66vndn8v" />
    <content type="html">
      SANS: Top 5 Most Dangerous New Attack Techniques to Watch&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.darkreading.com/threat-intelligence/sans-most-dangerous-attack-techniques&#34;&gt;https://www.darkreading.com/threat-intelligence/sans-most-dangerous-attack-techniques&lt;/a&gt;
    </content>
    <updated>2026-03-28T03:39:21&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsr5l9qg2vzaqdhf79ayvgt57yht06edc7mzxvd7nc38yd9wc9ek0czyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t666dp733</id>
    
      <title type="html">Backdoored Telnyx PyPI package pushes malware hidden in WAV audio ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsr5l9qg2vzaqdhf79ayvgt57yht06edc7mzxvd7nc38yd9wc9ek0czyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t666dp733" />
    <content type="html">
      Backdoored Telnyx PyPI package pushes malware hidden in WAV audio&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/backdoored-telnyx-pypi-package-pushes-malware-hidden-in-wav-audio/&#34;&gt;https://www.bleepingcomputer.com/news/security/backdoored-telnyx-pypi-package-pushes-malware-hidden-in-wav-audio/&lt;/a&gt;
    </content>
    <updated>2026-03-28T01:27:02&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs8kdenq4d66d7v6upxargumrhu4wuf97ckdlefcusw65c9la3s4nczyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66drnv79</id>
    
      <title type="html">GlassWorm: Part 6. Fake Trezor Suite and Ledger Live for macOS, ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs8kdenq4d66d7v6upxargumrhu4wuf97ckdlefcusw65c9la3s4nczyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66drnv79" />
    <content type="html">
      GlassWorm: Part 6. Fake Trezor Suite and Ledger Live for macOS, per-request polymorphic builds.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.reddit.com/r/netsec/comments/1s3kiyj/glassworm_part_6_fake_trezor_suite_and_ledger/&#34;&gt;https://www.reddit.com/r/netsec/comments/1s3kiyj/glassworm_part_6_fake_trezor_suite_and_ledger/&lt;/a&gt;
    </content>
    <updated>2026-03-27T23:18:03&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs269wd7efyhua2rkf8hap3tznrnq9y22vz8he3uepl9ahv6tfn5wqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t667d804h</id>
    
      <title type="html">Critical 9.4 CVSS RCE Flaws in n8n Turn Workflows into Backdoors ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs269wd7efyhua2rkf8hap3tznrnq9y22vz8he3uepl9ahv6tfn5wqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t667d804h" />
    <content type="html">
      Critical 9.4 CVSS RCE Flaws in n8n Turn Workflows into Backdoors&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityonline.info/n8n-critical-rce-vulnerabilities-merge-gsuiteadmin-nodes/&#34;&gt;https://securityonline.info/n8n-critical-rce-vulnerabilities-merge-gsuiteadmin-nodes/&lt;/a&gt;
    </content>
    <updated>2026-03-27T20:54:47&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsr98umtpctxzsmu6tr8rqnxnqv6ulv4ly0awevvuenmws6ch260ygzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66k4ljs5</id>
    
      <title type="html">Fake VS Code alerts on GitHub spread malware to developers ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsr98umtpctxzsmu6tr8rqnxnqv6ulv4ly0awevvuenmws6ch260ygzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66k4ljs5" />
    <content type="html">
      Fake VS Code alerts on GitHub spread malware to developers&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/fake-vs-code-alerts-on-github-spread-malware-to-developers/&#34;&gt;https://www.bleepingcomputer.com/news/security/fake-vs-code-alerts-on-github-spread-malware-to-developers/&lt;/a&gt;
    </content>
    <updated>2026-03-27T18:54:34&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs2xm82yz8n5h3qe4n557423aq3gmj3mp9jxm948gzg2d70qh25khqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t669y43rk</id>
    
      <title type="html">CISA: New Langflow flaw actively exploited to hijack AI workflows ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs2xm82yz8n5h3qe4n557423aq3gmj3mp9jxm948gzg2d70qh25khqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t669y43rk" />
    <content type="html">
      CISA: New Langflow flaw actively exploited to hijack AI workflows&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/cisa-new-langflow-flaw-actively-exploited-to-hijack-ai-workflows/&#34;&gt;https://www.bleepingcomputer.com/news/security/cisa-new-langflow-flaw-actively-exploited-to-hijack-ai-workflows/&lt;/a&gt;
    </content>
    <updated>2026-03-27T16:28:04&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqswtuu9zupgy5yv0pljtqsn36cq5guj4rcgnvfrjsk9y06vn5rs8aqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66fratz0</id>
    
      <title type="html">Critical Flaw in Langflow AI Platform Under Attack ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqswtuu9zupgy5yv0pljtqsn36cq5guj4rcgnvfrjsk9y06vn5rs8aqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66fratz0" />
    <content type="html">
      Critical Flaw in Langflow AI Platform Under Attack&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.darkreading.com/vulnerabilities-threats/critical-flaw-langflow-ai-platform-under-attack&#34;&gt;https://www.darkreading.com/vulnerabilities-threats/critical-flaw-langflow-ai-platform-under-attack&lt;/a&gt;
    </content>
    <updated>2026-03-27T13:45:45&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsw8leyukgay0j3hwlu0vnvhnznfh7jdqgaatmcg5n6qceluj6qx2szyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t662yyq3s</id>
    
      <title type="html">GlassWorm attack installs fake browser extension for surveillance ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsw8leyukgay0j3hwlu0vnvhnznfh7jdqgaatmcg5n6qceluj6qx2szyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t662yyq3s" />
    <content type="html">
      GlassWorm attack installs fake browser extension for surveillance&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.malwarebytes.com/blog/news/2026/03/glassworm-attack-installs-fake-browser-extension-for-surveillance&#34;&gt;https://www.malwarebytes.com/blog/news/2026/03/glassworm-attack-installs-fake-browser-extension-for-surveillance&lt;/a&gt;
    </content>
    <updated>2026-03-27T11:35:12&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsw56637wcezxwhv2g9ve08282r9r3n3jgsecy6c4z6sqpg3ler7dczyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66xem42l</id>
    
      <title type="html">Coruna iOS exploit framework linked to Triangulation attacks ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsw56637wcezxwhv2g9ve08282r9r3n3jgsecy6c4z6sqpg3ler7dczyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66xem42l" />
    <content type="html">
      Coruna iOS exploit framework linked to Triangulation attacks&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/coruna-ios-exploit-framework-linked-to-triangulation-attacks/&#34;&gt;https://www.bleepingcomputer.com/news/security/coruna-ios-exploit-framework-linked-to-triangulation-attacks/&lt;/a&gt;
    </content>
    <updated>2026-03-27T09:26:05&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsqclddtarfh4nshhvftw2dfpj4x60hzmpmyajapq3u8vm0uqmulzczyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66nla59p</id>
    
      <title type="html">Critical RCE Flaw in PTC Windchill and FlexPLM Puts Product Data ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsqclddtarfh4nshhvftw2dfpj4x60hzmpmyajapq3u8vm0uqmulzczyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66nla59p" />
    <content type="html">
      Critical RCE Flaw in PTC Windchill and FlexPLM Puts Product Data at Risk&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityonline.info/ptc-windchill-flexplm-critical-rce-vulnerability-cve-2026-4681/&#34;&gt;https://securityonline.info/ptc-windchill-flexplm-critical-rce-vulnerability-cve-2026-4681/&lt;/a&gt;
    </content>
    <updated>2026-03-27T07:07:33&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsy33jqadsu3pvmu4k94z36ssf46xhqzyylhcnelxut2vr5lujpthqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66efsl32</id>
    
      <title type="html">ClickFix Campaigns Targeting Windows and macOS ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsy33jqadsu3pvmu4k94z36ssf46xhqzyylhcnelxut2vr5lujpthqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66efsl32" />
    <content type="html">
      ClickFix Campaigns Targeting Windows and macOS&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.recordedfuture.com/research/clickfix-campaigns-targeting-windows-and-macos&#34;&gt;https://www.recordedfuture.com/research/clickfix-campaigns-targeting-windows-and-macos&lt;/a&gt;
    </content>
    <updated>2026-03-27T05:02:58&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqstk0h23rwvd807405s9dyrluhndcjux7nur2nfeujjgavpt529eaqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t665heway</id>
    
      <title type="html">Proof-of-Concept Released: Public Exploit Details for Windows ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqstk0h23rwvd807405s9dyrluhndcjux7nur2nfeujjgavpt529eaqzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t665heway" />
    <content type="html">
      Proof-of-Concept Released: Public Exploit Details for Windows Error Reporting LPE (CVE-2026-20817)&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityonline.info/windows-error-reporting-lpe-cve-2026-20817-public-poc-exploit/&#34;&gt;https://securityonline.info/windows-error-reporting-lpe-cve-2026-20817-public-poc-exploit/&lt;/a&gt;
    </content>
    <updated>2026-03-27T03:02:44&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsqcq2tpmrugt224ghmlk2jk7kjeklyj5vet372fdp6mq6a7njq94qzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66sszlr3</id>
    
      <title type="html">PROTOCOLO DELTA SWORD: Full Disclosure de Persistência Zero-Day ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsqcq2tpmrugt224ghmlk2jk7kjeklyj5vet372fdp6mq6a7njq94qzyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66sszlr3" />
    <content type="html">
      PROTOCOLO DELTA SWORD: Full Disclosure de Persistência Zero-Day e Omissão Corporativa (Google/Samsung)&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.reddit.com/r/netsec/comments/1s4irxz/protocolo_delta_sword_full_disclosure_de/&#34;&gt;https://www.reddit.com/r/netsec/comments/1s4irxz/protocolo_delta_sword_full_disclosure_de/&lt;/a&gt;
    </content>
    <updated>2026-03-27T00:55:51&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs8zq90twmcxxx7vplwx30c0tgwkuhy9gz00mc0psj786cwqvlpjlszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t662nh6r3</id>
    
      <title type="html">Hackers Actively Exploiting 9.8 Critical RCE Flaw in Kali Forms ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs8zq90twmcxxx7vplwx30c0tgwkuhy9gz00mc0psj786cwqvlpjlszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t662nh6r3" />
    <content type="html">
      Hackers Actively Exploiting 9.8 Critical RCE Flaw in Kali Forms WordPress Plugin&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityonline.info/kali-forms-vulnerability-wordpress-rce-cve-2026-3584/&#34;&gt;https://securityonline.info/kali-forms-vulnerability-wordpress-rce-cve-2026-3584/&lt;/a&gt;
    </content>
    <updated>2026-03-26T20:34:27&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsv70w9pjc0hh944f7mkwwszlsdv8c885a52puatpfph4vce6utwlszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66yrem8j</id>
    
      <title type="html">Most Google Cloud Attacks Start With Bug Exploitation ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsv70w9pjc0hh944f7mkwwszlsdv8c885a52puatpfph4vce6utwlszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66yrem8j" />
    <content type="html">
      Most Google Cloud Attacks Start With Bug Exploitation&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.darkreading.com/cloud-security/google-cloud-attacks-bug-exploitation&#34;&gt;https://www.darkreading.com/cloud-security/google-cloud-attacks-bug-exploitation&lt;/a&gt;
    </content>
    <updated>2026-03-22T12:16:42&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsp5py46m7q4qdgn4rvmv5dgje785dwcr2g5lpq52yw32vfvg6yruszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66gslq3q</id>
    
      <title type="html">Microsoft Azure Monitor alerts abused for callback phishing ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsp5py46m7q4qdgn4rvmv5dgje785dwcr2g5lpq52yw32vfvg6yruszyqm0gqak2ykhu6dm0wy5gt8y8lax8n0katfxg8texkernchvx4t66gslq3q" />
    <content type="html">
      Microsoft Azure Monitor alerts abused for callback phishing attacks&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/microsoft-azure-monitor-alerts-abused-in-callback-phishing-campaigns/&#34;&gt;https://www.bleepingcomputer.com/news/security/microsoft-azure-monitor-alerts-abused-in-callback-phishing-campaigns/&lt;/a&gt;
    </content>
    <updated>2026-03-22T10:09:16&#43;01:00</updated>
  </entry>

</feed>